Pass the CompTIA A+ 220-1102 Questions and answers with CertsForce

Viewing page 6 out of 17 pages
Viewing questions 76-90 out of questions
Questions # 76:

Due to special job responsibilities, an end user needs the ability to edit the properties of Windows system files. The user has already been granted local administrator privileges. Which of the following Control Panel utilities should be used to provide easy access to the files?

Options:

A.

File Explorer Options


B.

Ease of Access


C.

Indexing Options


D.

Administrative Tools


Expert Solution
Questions # 77:

The following error is displayed on a user's computer screen:

No operating system found

Which of the following is the first troubleshooting step a technician should complete?

Options:

A.

Disconnect external storage


B.

Flash the BIOS


C.

Replace the SATA cable


D.

Turn on the device in safe mode


Expert Solution
Questions # 78:

An organization has a goal to perform daily backups of a particular workstation and save them locally to the NAS. The organization needs to ensure these backup jobs are successful. Which of the following should the IT department do?

Options:

A.

Write scripts to rerun backups that fail.


B.

Store copies of the backups off site.


C.

Perform incremental backups instead.


D.

Set up alerts to be notified when backups fail.


Expert Solution
Questions # 79:

A company’s help desk receives numerous calls from employees reporting issues related to a current security breach. Which of the following steps should the help desk team take to document the breach?

Options:

A.

Record the details in the ticketing system.


B.

Take screenshots and attach them to the root cause analysis.


C.

Discuss the incident with the company’s legal team.


D.

List the details in the company’s knowledge base.


Expert Solution
Questions # 80:

During a routine check, a systems administrator discovers that a user's PC is running slowly and CPU utilization is at 100%. Further investigation shows a large amount of resource usage. Which of the following is the most likely cause of the high resource usage?

Options:

A.

Firewall activities


B.

Botnet attack


C.

DDoS attack


D.

Keylogger attack


Expert Solution
Questions # 81:

An organization's critical database files were attacked with ransomware. The company refuses to pay the ransom for a decryption key. All traces of the infection have been removed from the underlying servers. Which of the following should the company do next?

Options:

A.

Scan all of the infected files with up-to-date, anti-malware cleaning software.


B.

Fully patch the server operating systems hosting the fileshares.


C.

Change the files to be read-only.


D.

Restore critical data from backup.


Expert Solution
Questions # 82:

A technician is deploying a new Wi-Fi solution for the office and wants to ensure users can log in to the Wi-Fi with their existing network log-in and password. Which of the following methods should the technician use?

Options:

A.

AES


B.

RADIUS


C.

TKIP


D.

WPA3


Expert Solution
Questions # 83:

A user is unable to browse a website on a PC. Which of the following commands should a technician use to verify the PC's DNS resolution for the website?

Options:

A.

nslookup


B.

hostname


C.

tracert


D.

netstat


Expert Solution
Questions # 84:

A user’s personal computer was infected with malware that had a known remediation. Which of the following should the user have done to prevent this issue?

Options:

A.

Kept endpoint protection software updated


B.

Created a restore point


C.

Maintained a preinstallation environment


D.

Disabled System Restore


Expert Solution
Questions # 85:

A technician is setting up a wireless network in a small, crowded office and wants to minimize Wi-Fi access. Which of the following security settings should the technician enable?

Options:

A.

Port forwarding


B.

Unused ports


C.

SSID broadcast


D.

Allow list


Expert Solution
Questions # 86:

A technician ran the following command on a user's workstation:

net use G: \\server1\team\documents /persistent:yes

Which of the following did the technician set up by running this command?

Options:

A.

Mapped drive


B.

File server


C.

Shared folder


D.

Shared resource


Expert Solution
Questions # 87:

A technician is on-site dealing with an angry customer. The customer thinks the issues have not been addressed, while the technician thinks that the issue has been correctly resolved. Which of the following should the technician do to handle the situation?

Options:

A.

Insist that the customer is correct and document the concern.


B.

Listen to the customer and do not speak at all.


C.

Escalate the issue to the next tier.


D.

Apologize and ask what would help resolve the issue.


Expert Solution
Questions # 88:

A user in a SOHO asks an off-site, remote technician to connect securely to the user’s laptop. The technician is able to connect to the VPN but is unable to connect to the user’s laptop. Which of the following settings should the technician review?

Options:

A.

Wireless protocol


B.

DHCP pool


C.

Content filtering


D.

Firewall


Expert Solution
Questions # 89:

Which of the following change management practices lists all the changes that are taking place for a project to ensure that no unexpected changes happen?

Options:

A.

Risk analysis


B.

Scope


C.

Rollbackplan


D.

Review


Expert Solution
Questions # 90:

A systems administrator at a small company wants to discretely access user machines and verify patch levels without users noticing. Which of the following remote access technologies should the administrator use?

Options:

A.

RDP


B.

MSRA


C.

SSH


D.

VNC


Expert Solution
Viewing page 6 out of 17 pages
Viewing questions 76-90 out of questions